You are previewing Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.
O'Reilly logo
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Book Description

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices.

This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges.



  • Presents the most current, leading edge research on cloud and mobile application forensics, featuring a panel of top experts in the field
  • Introduces the first book to provide an in-depth overview of the issues surrounding digital forensic investigations in cloud and associated mobile apps
  • Covers key technical topics and provides readers with a complete understanding of the most current research findings
  • Includes discussions on future research directions and challenges

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Contributors
  6. About the Editors
  7. Chapter 1: Contemporary Digital Forensics Investigations of Cloud and Mobile Applications
    1. Abstract
  8. Chapter 2: Forensics Analysis of Android Mobile VoIP Apps
    1. Abstract
    2. 1 Introduction
    3. 2 Related Work
    4. 3 Experimental Setup
    5. 4 Results and Discussion
    6. 5 Conclusion and Future Work
  9. Chapter 3: Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine
    1. Abstract
    2. 1 Introduction
    3. 2 Related Work
    4. 3 Research Methodology
    5. 4 AIM Forensics
    6. 5 Conclusion and Future Work
  10. Chapter 4: Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies
    1. Abstract
    2. 1 Introduction
    3. 2 Methodology
    4. 3 Experiment Setup
    5. 4 Discussion and Analysis
    6. 5 Conclusion
  11. Chapter 5: Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies
    1. Abstract
    2. 1 Introduction
    3. 2 Experiment Setup
    4. 3 Discussion and Analysis
    5. 4 Conclusion and Future Works
  12. Chapter 6: Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors
    1. Abstract
    2. 1 Introduction
    3. 2 Review of Related Work
    4. 3 Experiment Design
    5. 4 Results and Discussion
    6. 5 Forensics Investigation Guideline
    7. 6 Limitations
    8. 7 Conclusion and Further Research
  13. Chapter 7: Performance of Android Forensics Data Recovery Tools
    1. Abstract
    2. 1 Introduction
    3. 2 Related Work
    4. 3 Experiment Setup
    5. 4 Results and Discussions
    6. 5 Conclusion and Future Works
  14. Chapter 8: Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model
    1. Abstract
    2. Acknowledgments
    3. 1 Introduction
    4. 2 Experiment Setup
    5. 3 Findings: Dionaea
    6. 4 Findings: Kippo
    7. 5 A Conceptual EASY Training Model
    8. 6 Conclusion and Future Work
  15. Chapter 9: Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory
    1. Abstract
    2. 1 Introduction
    3. 2 Background and Related Work
    4. 3 Methodology
    5. 4 Cyber Threat Landscape From a Rat Perspective
    6. 5 Discussion
    7. 6 Conclusion and Future Work
    8. Appendix 1 Questionnaire Items
  16. Chapter 10: Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics
    1. Abstract
    2. 1 Introduction
    3. 2 Our Proposed Antiforensics Framework for Digital CCTV Systems
    4. 3 Case Studies
    5. 4 Conclusion
  17. Chapter 11: Forensic Visualization: Survey and Future Research Directions
    1. Abstract
    2. 1 Introduction
    3. 2 Digital Forensics
    4. 3 Visualization is Key
    5. 4 Forensic Visualization Selection Criteria
    6. 5 Conclusion and Future Research
  18. Chapter 12: Investigating Storage as a Service Cloud Platform: pCloud as a Case Study
    1. Abstract
    2. 1 Introduction
    3. 2 Research Methodology
    4. 3 Analysis and Findings
    5. 4 Network Traffic
    6. 5 Conclusion
  19. Chapter 13: Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud
    1. Abstract
    2. 1 Introduction
    3. 2 Research Methodology
    4. 3 Findings: SpiderOak
    5. 4 Findings: JustCloud
    6. 5 Finding: pCloud
    7. 6 Conclusion and Future Work
  20. Chapter 14: Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies
    1. Abstract
    2. 1 Introduction
    3. 2 Research Methodology
    4. 3 Results and Discussion
    5. 4 Reporting and Presentation
    6. 5 Conclusion
  21. Chapter 15: An Android Cloud Storage Apps Forensic Taxonomy
    1. Abstract
    2. 1 Introduction
    3. 2 Experiment Setup
    4. 3 Discussion
    5. 4 Results
    6. 5 Conclusion and Future Works
    7. Appendix 1 List of Application Versions
    8. Appendix 2 Dataset List (EDRM)
    9. Appendix 3 Retrieved Artifacts
    10. Appendix 4 Network Traffic
  22. Index